EMC auditing templates
To audit a file:
1 Select View | Administration.
2 Select Auditing.
3
4 Click Add.
▪ EMC File Server (CIFS) - Select the EMC file server (CIFS) from the drop-down list. Or enter the Netbios name or IP address of the EMC file server (CIFS) to be audited.
▪ Audit Path - Select File. Enter a file name and path (i.e., <ShareName>\<Path>\<FileName>) to audit or click the browse button to locate and select a file. Click Add to move the specified audit path to the selection list.
Volume auditing is not supported and should not be used. Select File or Folder as the Audit Path.
▪ Events tab - Select the file events to audit for the file selected in the selection list.Repeat this step to add additional files to this auditing template.
NOTE: Selecting the File Events check box at the top of the events list on the Events tab will select all of the events listed. Similarly, clearing this check box will clear all of the selected events.
6 Click Next.
To add an agent to the EMC Auditing template:
▪ Click Add.
NOTE: Isilon file server auditing: There is no need to enter the EMC Control Station credentials when configuring auditing on an Isilon server. Skip to Step 9.Click Set Credentials and enter the following information:
▪ Control Station - enter the IP address of the EMC Control Station.
▪ User - enter the user name of an account with Administrative rights (required to create or modify the cepp.conf file) on the selected EMC Control Station.
▪ Password - enter the password associated with the user name entered above.
▪ Data Mover - select the data mover that hosts the CIFS file server specified on the first page of the wizard.Click Test to validate the credentials. Once the credentials are validated, click OK to set the credentials as entered and close the dialog.
The cepp.conf file will be created based on the information specified in the EMC Auditing wizard. Click Next to view the current and proposed settings for the cepp.conf file.
Use the buttons above the Current cepp.conf File text box, as described below:
▪ To deploy the proposed configuration file, click Update File.
▪ To check the current status of the cepp service, click Check Status.
▪ To audit the cepp.conf file checking for modifications made by another application, click Audit File. Select the Enable Auditing check box, review (and if necessary change) the polling interval, and select the Change Auditor agent to be used to poll this configuration file. Click OK to save your selections and close the dialog.
9
10 On the Administration Tasks tab, click the Configuration task button. Select Agent to open the Agent Configuration page.
11 To ensure the agents are using the latest configuration, select the Change Auditor agents assigned to the EMC Auditing template (Auditing appears in the EMC column) and click Refresh Configuration.To audit a folder:
1 Select View | Administration.
2 Select Auditing.
3
4 Click Add.
▪ EMC File Server (CIFS) - Select the EMC file server (CIFS) from the drop-down list. Or enter the Netbios name or IP address of the EMC file server (CIFS) to be audited.
▪ Audit Path - Select Folder. Enter a folder name and path (i.e., <ShareName>\<FolderName>) to audit or click the browse button to locate and select a folder.
NOTE: Isilon file server auditing:
When specifying file and folder paths to be audited, the file or folder’s absolute path should be used. Path values in Isilon events captured by Change Auditor are also represented in absolute paths. For example, if a share called ‘MyTestShare’ is sharing the path ‘\\isilon\ifs\test’, add the path ‘ifs\test’ in the auditing template to audit changes through the share.
Change Auditor uses the default ‘ifs’ share for Isilon file/folder permission change events. If you have renamed this share, please specify the new share name on this page to continue support for these events. To change the default ifs share name, click the "Isilion admin share name" link on the top right hand corner of the page.Click Add to add the specified folder to the Selection list.
6 By default, the scope of coverage for the selected folder will be This object and all child objects. However, you can change the scope, by selecting a different option from the drop-down box in the scope cell of the selection list:
▪ This object only- select this option to audit only the selected folder, not its files or subfolders.
▪ This object and child objects only - select this option to audit the selected folder and its direct files and subfolders. This is not recursive.
▪ This object and all child objects - select this option to audit this folder and all of its files and subfolders.
NOTE: Selecting the File Events or Folder Events check box at the top of the events list on the Events tab will select all of the events listed. Similarly, clearing these check boxes will clear all of the selected events.
For example, entering * will include all subfolders and files in the selected audit path.
Once you have specified the subfolders/files to be included, click the Add button to add it to the Inclusion list at the bottom of the page.
Repeat this step to add additional subfolders and files to the Inclusion list.
For example, entering *.log will exclude all files in the audit folder with the .log file extension. Whereas, entering **.log will exclude all files with the .log file extension found in the audit folder or in any subfolders.
You can also enter the name of an individual subfolder or file to be excluded.
Once you have specified a subfolder or file for exclusion, use the appropriate Add command to add it to the Exclusion list at the bottom of the page:
▪ Add | Folder - use this option to exclude activity against files/subfolders in any folders that match the exclusion string.
▪ Add | File - use this option to exclude activity against any files that match the exclusion string.Repeat this step to add additional subfolders and files to the Exclusion list.
Click Next.
▪ Click Add.
▪
NOTE: Isilon file server auditing: There is no need to enter the EMC Control Station credentials when configuring auditing on an Isilon server. Skip to Step 12.Click the Set Credentials button and enter the following information:
▪ Control Station - enter the IP address of the EMC Control Station.
▪ User - enter the user name of an account with Administrative rights (rights to create or modify the cepp.conf file) on the selected EMC Control Station.
▪ Password - enter the password associated with the user name entered above.
▪ Data Mover - select the data mover that hosts the CIFS file server specified on the first page of the wizard.Click Test to validate the credentials entered. Once the credentials are validated, select OK to set the credentials as entered and close the dialog.
The required cepp.conf file will be created based on the information specified in the EMC Auditing wizard. Click Next to view the current and proposed settings for the cepp.conf file.
Use the buttons above the Current cepp.conf File text box, as described below:
▪ To deploy the proposed configuration file, click Update File.
▪ To check the current status of the cepp service, click Check Status.
▪ To audit the cepp.conf file checking for modifications made by another application, click Audit File. Select the Enable Auditing check box, review (and if necessary change) the polling interval, and select the Change Auditor agent to be used to poll this configuration file. Click OK to save your selections and close the dialog.
12 Click Finish to close the wizard and create the EMC Auditing template.
13 On the Administration Tasks tab, click Configuration. Select Agent in the Configuration task list to open the Agent Configuration page.
14 Select the agents assigned to the EMC Auditing template (Auditing appears in the EMC column) and click Refresh Configuration to ensure the agents are using the latest configuration.To audit a volume:
NOTE: Isilon file server auditing: Volume auditing is not support and should not be used.
1
▪ EMC File Server (CIFS) - Select the EMC file server (CIFS) from the drop-down list. Or enter the Netbios name or IP address of the EMC file server (CIFS) to be audited.
▪ Audit Path - Select Volume. Enter a volume name (i.e., <VolumeName>) to be audited or click the browse button to locate and select a volume.Click Add to add the specified volume to the Selection list.
3 By default, the scope of coverage for the selected volume will be This object and all child objects, which cannot be changed.
NOTE: Selecting the File Events or Folder Events check box at the top of the events list on the Events tab will select all of the events listed. Similarly, clearing these check boxes will clear all of the selected events.
For example, entering * will include all subfolders and files in the selected audit path.
Once you have specified the subfolders/files to be included, click Add to add it to the Inclusion list at the bottom of the page.
Repeat this step to add additional subfolders and files to the Inclusion list.
For example, entering *.log will exclude all files in the audit folder with the .log file extension. Whereas, entering **.log will exclude all files with the .log file extension found in the audit folder or in any subfolders.
You can also enter the name of an individual subfolder or file to be excluded.
Once you have specified a subfolder or file for exclusion, use the appropriate Add command to add it to the Exclusion list at the bottom of the page:
▪ Add | Folder - use this option to exclude activity against files/subfolders in any folders that match the exclusion string.
▪ Add | File - use this option to exclude activity against any files that match the exclusion string.Repeat this step to add additional subfolders and files to the Exclusion list.
Click Next.
7
▪ Click Add.
▪Click Set Credentials and enter the following information:
▪ Control Station - enter the IP address of the EMC Control Station.
▪ User - enter the user name of an account with Administrative rights (rights to create or modify the cepp.conf file) on the selected EMC Control Station.
▪ Password - enter the password associated with the user name entered above.
▪ Data Mover - select the data mover that hosts the CIFS file server specified on the first page of the wizard.Click Test to validate the credentials. Once the credentials are validated, click OK to set the credentials as entered and close the dialog.
The required cepp.conf file will be created based on the information specified in the EMC Auditing wizard. Click Next to view the current and proposed settings for the cepp.conf file.
Use the buttons above the Current cepp.conf File text box, as described below:
▪ To deploy the proposed configuration file, click Update File.
▪ To check the current status of the cepp service, click Check Status.
▪ To audit the cepp.conf file checking for modifications made by another application, click Audit File. Select the Enable Auditing check box, review (and if necessary change) the polling interval, and select the Change Auditor agent to be used to poll this configuration file. Click OK to save your selections and close the dialog.
9 Click Finish to close the wizard and create the template.
10 On the Administration Tasks tab, click Configuration. Select Agent in the Configuration task list to open the Agent Configuration page. This will ensure the agents are using the latest configuration.
11 Select the Change Auditor agents assigned to the EMC Auditing template (Auditing appears in the EMC column) and click Refresh Configuration.To disable an auditing template:
▪ Place your cursor in the Status cell for the template to be disabled, click the arrow control and select Disabled.The entry in the Status column for the template will change to ‘Disabled’.
2 To re-enable the auditing template, use the Enable option in either the Status cell or right-click menu.To disable the auditing of an audit path in a template:
▪ Place your cursor in the Status cell for the audit path to be disabled, click the arrow control and select Disabled.The entry in the Status column for the selected file path will change to ‘Disabled’.
2 To re-enable the auditing of an audit path, use the Enable option in either the Status cell or right-click menu.To delete an auditing template:
1 On the Auditing page, select the template to be deleted and click Delete | Delete Template.To delete an audit path from a template:
1 On the Auditing page, select the audit path to be deleted and click Delete | Delete File Path.
2To delete a Change Auditor agent from a template:
1 On the Auditing page, select the agent to be deleted and click Delete | Delete Agent.
EMC Auditing wizard
The EMC Auditing wizard displays when you click Add on the EMC Auditing page. This wizard steps you through the process of creating a new EMC auditing template, specifying the EMC file server (CIFS) to be audited, the auditing scope and the agents to receive events.
The following table provides a description of the fields and controls in the EMC Auditing wizard:
Table 1. EMC Auditing wizard
Create or modify an EMC Auditing Template page: On the first page of the wizard, specify the EMC file server (CIFS) to auditand define the auditing scope.
Select the EMC file server (CIFS) from the list or enter the name of the EMC file server to audit.
Select one of the following options to define auditing for a file, folder or volume:
• File - select this option to audit a single file. Then enter a file name and path (<ShareName>\<Path>\<FileName>) or click the browse button to locate and select the file to be audited.
• Folder - select this option to audit a folder or a set of files. Then enter a folder name and path (<ShareName>\<FolderName>) or click the browse button to locate and select the folder to be audited.NOTE: Isilon file server auditing: When specifying a file path to be audited, you should use the file’s absolute path. Path values in Isilon events captured by Change Auditor are also represented in absolute paths. For example, if a share called ‘MyTestShare’ is sharing the path ‘\\isilon\ifs\test’, and you want to audit the file MyDoc.docx inside that share, add the path ‘ifs\test\MyDoc.docx’ in the auditing template.
• Volume - select this option to audit a single volume. Then enter the volume name (<VolumeName>) or click the browse button to locate and select the volume to be audited.
• All Volumes - select this option to audit all volumes. The Audit Path text box will contain an asterisk which cannot be changed.NOTE: Isilon file server auditing: Volume auditing is not supported and should not be used.Once you have entered the audit path to be audited, use the Add button to add it to the selection list.
Use the Add button to move the entry in the Audit Path text box to the selection list.
NOTE: Even though you cannot edit the Audit Path when the All Volumes option is selected, you must still click Add to move it to the selection list.Select an entry in the selection list and click Remove to remove it from the list.
When a Folder is selected, you can use the drop-down menu in the Scope field to change the scope of coverage for the folder.
• This object only - select this option to audit only the selected folder, not its files or subfolders.
• This object and child objects only - select this option to audit the selected folder and its direct files and subfolders. This is not recursive.
• This object and all child objects - select this option to audit this folder and all of its files and subfolders. (Default)Events tab: Use the Events tab to select vital file and/or folder events.
NOTE: The process for capturing ACL events is extremely slow. See Performance Considerations for more details on the process used to capture ACL events.Select the file events to audit. Select the File Events check box to select all of the file events listed or select individual events from the list.
Select the folder events to audit. Select the Folder Events check box to select all of the folder events listed or select individual events from the list.
Inclusions tab: When the Folder, Volume or All Volumes option is selected in the Audit Path field and the Scope includes child objects, the Inclusions tab will be displayed allowing you to specify what in the selected audit path is to be audited.
Note: The slash (\) and double asterisk (**) characters can only be used with volumes.
For example, entering * will include all folders and files in the selected audit path. See File/Folder Inclusion and Exclusion Examples for more file mask examples.
Once you have specified the subfolders or files to be included, click Add to add it to the Inclusions list.
Use Add to move the entry in the text box to the Inclusions list.
Select an entry in the Inclusions list and click Remove to remove it.
Exclusions Tab (Optional): When the Folder, Volume or All Volumes option is selected in the Audit Path field and the Scope includes child objects, the Exclusions tab will be displayed allowing you to refine the settings defined on the Inclusions tab. That is, you can optionally specify the names and paths of any subfolders and files in the selected audit path that are to be excluded from auditing.
Add the names and paths of subfolders and files to exclude from auditing
For example, entering *.log will exclude all files in the audit folder with the .log file extension. Whereas, entering **.log will exclude all files with the .log file extension found in the audit folder or in any subfolders.
See File/Folder Inclusion and Exclusion Examples for more examples.
You can also enter the name of an individual subfolder or file that is to be excluded from auditing.
Once you have selected a subfolder or file to be excluded, select the appropriate Add button to add it to the Exclusions list.
Use one of the following Add commands to move the entry in the text box to the Exclusions list:
• Add | Folder - use this option to exclude activity against files/subfolders in any folders that match the exclusion string.
• Add | File - use this option to exclude activity against any files that match the exclusion string.Select an entry in the Exclusions list and click the Remove button to remove it.
Select Change Auditor agents page: Use this page to select the agents that are to receive the events captured on the selected EMC file server (CIFS).
Click Add to assign one or more agents to the EMC Auditing template.
Click Remove to remove the selected agent from the list.
Click the Set Credentials button to enter the credentials to be used to access the selected EMC Control Station:
• Control Station - enter the IP address of the EMC Control Station.
• User - enter the user name of an account with Administrative rights (rights to create or modify the cepp.conf file) on the selected EMC Control Station.
• Password - enter the password associated with the user name entered above.
• Data Mover - select the data mover that hosts the EMC file server (CIFS) specified on the first page of the wizard.Click the Test button to validate the credentials entered. Once the credentials are validated, click OK to set the credentials as entered and close the dialog.
CEPP.CONF file page: If you have changed or added agents to your template, use this page to review the changes you are proposing to make to the cepp.conf file. This page displays the current and proposed cepp.conf files. In addition to viewing the current and proposed cepp.conf files, you can optionally make changes to the proposed cepp.conf file or deploy the proposed cepp.conf file on the selected EMC Control Station.
NOTE: Isilon file server auditing: This information is not required; click Finish to create the EMC Auditing template.Click Update File to deploy the proposed configuration file on the EMC Control Station.
Click Check Status to run the following command to check the status of the cepp service:
server_cepp <Data Mover Name> -pool -info
Click the Audit File button to enable or disable the auditing of the cepp.conf file for changes made by other third-party applications.
Clicking this button displays the Configure cepp.conf Auditing dialog. To enable the auditing of this file, select the Enable Auditing check box and select a Change Auditor agent that is to poll for changes. Click OK to save your selections and close the dialog.
Displays the contents of the current cepp.conf file on the selected EMC Control Station.
File System events settings
Discard duplicates that occur within nn seconds Audit all configured, including duplicates (Not Recommended) To set the File System events settings:
2 Click Configuration.
3
4 Click Configurations.
7 Once you have set these settings, click OK to save your selections, close the dialog and return to the Agent Configuration page.
8 On the Agent Configuration page, select the Change Auditor agent(s) assigned to the EMC Auditing template (Auditing appears in the EMC column) and click Refresh Configuration.
EMC event logging
Event logging is disabled by default. When enabled, only configured activities are sent to the EMC event log. See the Change Auditor for EMC Event Reference Guide for a list of the events that can be sent to the event log.
To enable event logging:
2 Click Configuration.
3 Select Agent in the Configuration task list to display the Agent Configuration page.
4 Click Event Logging.
5 On the Event Logging dialog, select EMC Events.
6 Click OK to save your selection and close the dialog.